CN117874741A - Browser trusted running method, system, computer equipment and storage medium - Google Patents

Browser trusted running method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN117874741A
CN117874741A CN202311800902.9A CN202311800902A CN117874741A CN 117874741 A CN117874741 A CN 117874741A CN 202311800902 A CN202311800902 A CN 202311800902A CN 117874741 A CN117874741 A CN 117874741A
Authority
CN
China
Prior art keywords
browser
trusted
running
plug
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311800902.9A
Other languages
Chinese (zh)
Inventor
段古纳
张晓利
范宗亮
马瑞繁
齐洪东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD
Original Assignee
BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD filed Critical BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD
Priority to CN202311800902.9A priority Critical patent/CN117874741A/en
Publication of CN117874741A publication Critical patent/CN117874741A/en
Pending legal-status Critical Current

Links

Abstract

The application relates to a browser trusted running method, a browser trusted running system, computer equipment and a storage medium. The method comprises the following steps: when a browser running request sent by a browser terminal through a secure channel is received, identity authentication is carried out on identity information carried by the browser running request, and an authentication result is obtained; acquiring operation authority information corresponding to the identity information under the condition that the authentication result is that the authentication is passed; and sending the operation permission information to the browser terminal through the secure channel, wherein the browser terminal is used for operating the trusted plugin indicated by the operation permission information in a secure sandbox under the condition of operating the browser so as to access the preset webpage or execute the preset application program. The security sandbox is used for limiting the authority and access range of the code so as to prevent a user from being attacked by malicious code when accessing a webpage and executing JavaScript code through a browser.

Description

Browser trusted running method, system, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, a system, a computer device, and a storage medium for trusted running of a browser.
Background
With the popularization and development of the internet, people increasingly rely on browsers to conduct various online activities, including online shopping, bank transfer, social media interaction, and the like. At the same time, however, network security threats, such as malware, hacking, and data leakage, are increasing. In this context, trusted computing is an important concept and technology. Trusted computing aims at protecting the privacy and data security of users, ensuring that communication and interaction between user terminals and servers are not interfered or peeped by unauthorized, and ensuring the integrity and confidentiality of data in transmission and storage processes by using hardware protection and encryption technology in the computing process.
However, currently trusted computing is mainly implemented on the server side, and the user terminal is generally not sufficiently protected. Users are vulnerable to malware through browsers when accessing web pages and executing JavaScript code, which can lead to theft or tampering of sensitive information of the users.
Disclosure of Invention
The application provides a browser trusted running method, a browser trusted running system, computer equipment and a storage medium, which are used for solving the problem that a user is easy to attack by malicious software when accessing a webpage and executing JavaScript codes through a browser, so that sensitive information of the user is stolen or tampered.
In a first aspect, the present application provides a method for trusted running of a browser, which is applied to a trusted management center, and the method includes:
when a browser running request sent by a browser terminal through a secure channel is received, identity authentication is carried out on identity information carried by the browser running request to obtain an authentication result, wherein the browser running request is used for indicating the browser terminal to request to access a preset webpage or execute a preset application program through a browser;
acquiring operation authority information corresponding to the identity information under the condition that the authentication result is that the authentication is passed;
and sending the operation permission information to the browser terminal through the secure channel, wherein the browser terminal is used for operating the trusted plugin indicated by the operation permission information in a secure sandbox under the condition of operating the browser so as to access the preset webpage or execute the preset application program.
In a second aspect, the present application provides a method for trusted running of a browser, applied to a browser terminal, where the method includes:
when an operation instruction of a browser is received, a browser operation request is sent to a trusted management center, wherein the browser operation request is used for indicating the browser terminal to request to access a preset webpage or execute a preset application program through the browser;
and when receiving the running authority information issued by the trusted management center, running the trusted plugin indicated by the running authority information in a safe sandbox under the condition of running the browser so as to access the preset webpage or execute the preset application program.
In a third aspect, the present application provides a browser trusted running system, where the system includes a trusted management center for implementing the browser trusted running method according to the first aspect, and a browser terminal for implementing the browser trusted running method according to the second aspect.
In a fourth aspect, the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the above-mentioned browser trusted running method when executing the computer program.
In a fifth aspect, the present application further provides a computer storage medium storing computer executable instructions for performing the above-described browser trusted running method.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages: according to the method, when a browser running request sent by a browser terminal through a secure channel is received, identity information carried by the browser running request is subjected to identity authentication to obtain an authentication result, wherein the browser running request is used for indicating the browser terminal to request to access a preset webpage through a browser or execute a preset application program; acquiring operation authority information corresponding to the identity information under the condition that the authentication result is that the authentication is passed; and sending the operation permission information to the browser terminal through the secure channel, wherein the browser terminal is used for operating the trusted plugin indicated by the operation permission information in a secure sandbox under the condition of operating the browser so as to access the preset webpage or execute the preset application program.
Based on the method, the trusted management center sends the operation authority information corresponding to the browser terminal, so that the browser terminal operates the trusted plugin indicated by the operation authority information in the safe sandbox under the condition of operating the browser, and the safe sandbox is used for limiting the authority and the access range of the code so as to prevent a user from being attacked by malicious codes when accessing the webpage and executing the JavaScript code through the browser.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements, and in which the figures of the drawings are not to be taken in a limiting sense, unless otherwise indicated.
Fig. 1 is an application environment diagram of a trusted running method of a browser provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of a trusted running method of a browser according to an embodiment of the present application;
fig. 3 is a flow chart of a trusted running method of a browser according to an embodiment of the present application;
FIG. 4 is a block diagram of a trusted running system of a browser according to an embodiment of the present application;
fig. 5 is a schematic diagram of an internal structure of a computer device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
The following disclosure provides many different embodiments, or examples, for implementing different structures of the invention. In order to simplify the present disclosure, components and arrangements of specific examples are described below. They are, of course, merely examples and are not intended to limit the invention. Furthermore, the present invention may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
FIG. 1 is an application environment diagram of a browser trusted running method in one embodiment. Referring to fig. 1, the browser trusted running method is applied to a browser trusted running system. The browser trusted running system includes a browser terminal 110 and a trusted management center 120. The browser terminal 110 and the trusted management center 120 are connected through a network. Browser terminal 110 may be, in particular, a desktop or mobile terminal equipped with any browser, which is an application used to retrieve, display, and deliver Web information resources. The Web information resource is tagged with a uniform resource identifier (Uniform Resource Identifier, URI), which is a Web page, a picture, a video, or any content presented on the Web. The user can browse the information related to each other through the browser by means of Hyperlinks (Hyperlinks). The mobile terminal can be at least one of a mobile phone, a tablet computer, a notebook computer and the like. Trusted management center 120 may be implemented as a stand-alone server or as a cluster of servers.
The trusted management center is responsible for managing and controlling the security and configuration of all trusted browser terminals. The trusted management center provides user management functions including user identity authentication, access control, and rights management. The management center maintains a browser plug-in white list and is used for managing and controlling a plug-in list allowed to run in the trusted browser terminal. The trusted authority (CA) may be integrated with a Certificate Authority (CA) for managing and distributing digital certificates, ensuring security and authentication of communications.
The browser terminal is a browser application program running on user terminal equipment and has the functions of trusted computing and safe sandbox environment. The browser terminal needs to carry a trusted root module supporting trusted computing to provide a secure execution environment. The browser terminal communicates with the management center, and transmits data and configuration information through a safe channel to acquire updated plug-in white list and certificate information. And the browser terminal is internally provided with a plug-in management and verification function, and is used for verifying, authorizing and monitoring the plug-ins, ensuring that only trusted plug-ins in a white list are allowed to run, and preventing malicious plug-ins from being executed.
In one embodiment, fig. 2 is a flow chart of a trusted running method of a browser in one embodiment, and referring to fig. 2, a trusted running method of a browser is provided. The embodiment is mainly exemplified by the application of the method to the trusted management center 120 in fig. 1, and the method for trusted running of the browser specifically includes the following steps:
step S210, when a browser running request sent by a browser terminal through a secure channel is received, identity authentication is performed on identity information carried by the browser running request to obtain an authentication result, wherein the browser running request is used for indicating that the browser terminal requests to access a preset webpage or execute a preset application program through a browser.
Specifically, the browser running request may be a request for a user to access a preset webpage through a browser or a request for executing a preset application program through the browser, the preset webpage may be any legal webpage, and the preset application program may be any browser application program. The browser running request carries the identity information of the browser terminal, and the identity information specifically comprises the communication address of the browser terminal, the terminal model, the terminal identification, the user account number, the login password and the like. The identity authentication of the identity information of the browser terminal is that the user account is subjected to password verification to judge the login legitimacy of the user account, and the access right of the user account is determined.
Step S220, when the authentication result is that the authentication is passed, the operation authority information corresponding to the identity information is obtained.
Specifically, when the authentication result is that the identity of the browser terminal is legal, the operation authority information corresponding to the identity information is obtained, the operation authority information is used for indicating the trusted plugin corresponding to the browser terminal, the trusted plugin is a safe and trusted plugin, and the plugin is a program written by an application program interface conforming to a certain specification, and can only run under a system platform (possibly supporting a plurality of platforms at the same time) specified by the program, but cannot be independently run from the specified platform.
And step S230, the operation authority information is sent to the browser terminal through the secure channel, wherein the browser terminal is used for operating the trusted plugin indicated by the operation authority information in the secure sandbox under the condition of operating the browser so as to access the preset webpage or execute the preset application program.
Specifically, the secure sandbox is an execution environment that limits program behavior according to a security policy, and is a virtual system program that allows a browser or other program to run in the sandbox environment, so that changes generated by the running process can be subsequently deleted, which creates an independent operating environment similar to a sandbox, and the program running inside the sandbox cannot permanently affect the hard disk. The trusted management center sends the operation authority information corresponding to the browser terminal, so that the browser terminal operates the trusted plugin indicated by the operation authority information in a safe sandbox under the condition of operating the browser, and the safe sandbox is used for limiting the authority and the access range of the code so as to prevent a user from being attacked by malicious codes when accessing a webpage and executing JavaScript code through the browser.
In one embodiment, the obtaining the operation authority information corresponding to the identity information when the authentication result is that the authentication is passed includes:
acquiring a plug-in white list and an authentication certificate corresponding to the identity information when the authentication result is that the authentication is passed, wherein the plug-in white list comprises plug-in identifiers of a plurality of trusted plug-ins;
and taking the plug-in white list and the authentication certificate as the running authority information.
Specifically, if the authentication result is that the authentication passes, a plug-in white list and an authentication certificate corresponding to the identity information are obtained, the plug-in white list comprises plug-in identifiers of a plurality of safe and reliable plug-ins, and the trusted management center periodically maintains the plug-in white list corresponding to each browser terminal and is used for managing and controlling the plug-in list allowed to run in the browser terminal. The trusted management center is also used for providing authentication certificates, and the authentication certificates are used for ensuring the identity verification and the data integrity in the communication process.
In one embodiment, after the sending the operation authority information to the browser terminal through the secure channel, the method further includes:
and when an abnormal measurement result sent by the browser terminal is received, generating a safety log corresponding to the browser terminal according to the abnormal measurement result, and feeding back an abnormal elimination scheme corresponding to the abnormal measurement result to the browser terminal.
Specifically, the abnormal measurement result refers to a dynamic measurement result generated in the running process of the trusted plugin in the browser terminal in the safe sandbox, which means that the browser terminal applies the dynamic measurement function in the trusted computing technology to the sandbox environment of the browser to limit the access authority and the behavior range of malicious codes and prevent the malicious codes from attacking the browser terminal. The exception measurement result indicates that the dynamic measurement result of the trusted plugin when running in the security sandbox is an exception, or indicates that the trusted plugin suffers security threat or abnormal behavior in the running process. And the trusted management center forms a security log according to the abnormal measurement result and is used for security audit and event investigation.
The trusted management center also feeds back corresponding security measures or response measures, namely an anomaly elimination scheme, according to the anomaly measurement result, and the corresponding security measures or response measures, namely the anomaly elimination scheme, are used for repairing security holes or eliminating security threats and anomaly attacks so as to ensure the safe operation of the browser.
In one embodiment, as shown in fig. 3, a method for trusted running of a browser is provided and applied to a browser terminal, and the method includes:
step S310, when receiving an operation instruction of the browser, sending a browser operation request to a trusted management center, wherein the browser operation request is used for indicating the browser terminal to request to access a preset webpage or execute a preset application program through the browser.
Specifically, the operation instruction is used for indicating an operation instruction initiated by a user to a browser in the browser terminal, and indicates that the user accesses a preset webpage or executes a preset application program through the browser, and then a browser operation request is sent to the trusted management center, wherein the browser operation request also carries identity information of the browser terminal, and the trusted management center is used for feeding back corresponding operation authority information for the browser terminal under the condition that the identity information is authenticated.
Step S320, when receiving the running authority information issued by the trusted management center, running the trusted plugin indicated by the running authority information in the secure sandbox under the condition of running the browser, so as to access the preset webpage or execute the preset application program.
Specifically, the operation authority information is used for indicating a safe and reliable plug-in, after the browser terminal receives the operation authority information, the reliable plug-in indicated by the operation authority information is operated in a safe sandbox, the safe sandbox is an execution environment for limiting the program behavior according to a safety strategy, the safe sandbox is a virtual system program, and the browser or other programs are allowed to operate in the sandbox environment, so that the changes generated by operation can be deleted later, an independent operation environment similar to a sandbox is created, and the programs operated in the safe sandbox cannot permanently influence a hard disk. And the browser terminal runs the trusted plugin indicated by the running authority information in a safe sandbox under the condition of running the browser, and the safe sandbox is used for limiting the authority and the access range of the code so as to prevent a user from being attacked by malicious codes when accessing a webpage and executing JavaScript codes through the browser.
In one embodiment, when receiving the running authority information issued by the trusted management center, running the trusted plugin indicated by the running authority information in a secure sandbox under the condition of running a browser to access the preset webpage or execute the preset application program, including:
and when receiving a plug-in white list and an authentication certificate issued by the trusted management center, running a trusted plug-in corresponding to a plug-in identifier in the plug-in white list in a security sandbox under the condition of running a browser so as to access the preset webpage or execute the preset application program.
Specifically, the operation authority information comprises a plug-in white list and an authentication certificate, the plug-in white list comprises plug-in identifiers of a plurality of safe and reliable plug-ins, and the trusted management center periodically maintains the plug-in white list corresponding to each browser terminal and is used for managing and controlling the plug-in list allowed to operate in the browser terminal. The trusted management center is also used for providing authentication certificates, and the authentication certificates are used for ensuring the identity verification and the data integrity in the communication process.
In one embodiment, when receiving the plug-in whitelist and the authentication certificate issued by the trusted management center, running a trusted plug-in corresponding to a plug-in identifier in the plug-in whitelist in a secure sandbox under the condition of running a browser, so as to access the preset webpage or execute the preset application program, the method further includes:
encrypting the identity information of the browser terminal and a data request by using the authentication certificate to obtain encrypted identity information and an encrypted data request, wherein the data request is used for requesting to acquire target data;
sending the encrypted identity information and the encrypted data request to a resource server;
under the condition that the resource server passes the authentication of the encrypted identity information and successfully decrypts the encrypted data request, obtaining encrypted target data after the resource server encrypts the target data according to the authentication certificate;
and decrypting the encrypted target data according to the authentication certificate to obtain the target data.
Specifically, the resource server is a server storing target data, and also stores an authentication certificate issued by the trusted management center, so that decryption verification can be performed on encrypted identity information of the browser terminal to judge identity validity of the browser terminal, after verification is passed, a data request is responded, but before the target data corresponding to the data request is sent, encryption processing is performed on the target data according to the authentication certificate, the encrypted target data is provided to the browser terminal, and the browser terminal decrypts the encrypted target data by using the authentication certificate to obtain the target data.
And the browser terminal encrypts and decrypts the interaction information between the browser terminal and the resource server by using an authentication certificate issued by the trusted management center so as to ensure the communication safety and the interaction data integrity between the browser terminal and the resource server.
In one embodiment, when receiving the plug-in whitelist and the authentication certificate issued by the trusted management center, running a trusted plug-in corresponding to a plug-in identifier in the plug-in whitelist in a secure sandbox under the condition of running a browser, so as to access the preset webpage or execute the preset application program, the method further includes:
in the process of running the trusted plugins in the plugin white list in the security sandbox, carrying out security measurement on the browser terminal to obtain a trusted measurement result;
when the trusted measurement result is an abnormal measurement result, sending the abnormal measurement result to the trusted management center;
and executing an anomaly elimination scheme fed back by the trusted management center for the anomaly measurement result when the anomaly elimination scheme is received.
Specifically, when the browser terminal accesses a preset webpage or executes a preset application program through the browser, namely a trusted plugin triggers a dynamic measurement function in the process of running in a secure sandbox, security measurement is carried out on the browser terminal to obtain a trusted measurement result, the trusted measurement result specifically comprises a plugin measurement result and a sandbox measurement result, at least any one of the measurement results is an abnormal measurement result, the trusted measurement result is a normal measurement result or an abnormal measurement result, when the trusted measurement result is an abnormal measurement result, the trusted measurement result indicates that the currently running trusted plugin suffers from abnormal behavior or has security threat in the process of running in the secure sandbox, a trusted management center needs to be informed in time, and an abnormal elimination scheme corresponding to the abnormal measurement result is acquired from the trusted management center, and the browser terminal is used for repairing security vulnerabilities or eliminating security threats and abnormal attacks according to the abnormal elimination scheme so as to ensure the safe running of the browser.
Fig. 2 and 3 are flow diagrams of a trusted browser running method in one embodiment. It should be understood that, although the steps in the flowcharts of fig. 2 and 3 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2 and 3 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the sub-steps or stages are performed necessarily occur in sequence, but may be performed alternately or alternately with at least a portion of the other steps or sub-steps of other steps.
In one embodiment, as shown in fig. 4, the trusted management center includes:
the browser center service is responsible for managing and controlling the security and configuration of the trusted browser terminal; providing user management functions including user identity authentication, access control and rights management; maintaining a plug-in white list, which is used for managing and controlling a plug-in list allowed to run in the trusted browser terminal; the method comprises the steps of communicating with a trusted center service and a CA service, providing plug-in information and browser terminal application information for the trusted center service, and acquiring a security report; and acquiring a certificate chain and a certificate update from the CA service. The user accesses the browser center service of the trusted management center through the browser, registers and submits the identity information. The browser centric service authenticates the user and assigns a unique identifier to it. The administrator adds, deletes or updates the plug-in whitelist through the browser centric service. The browser-centric service pushes the latest plug-in whitelist to the trusted-centric service.
The trusted center service is responsible for providing functions of browser terminal application reference value collection, plug-in reference value collection and terminal measurement report collection and generation. A list of trusted plugin reference values is maintained for delivery to the trusted terminal component. And managing and controlling the trusted policy configuration of the trusted terminal module. The method comprises the steps of obtaining a digital certificate of a CA service through a browser center service, wherein the method comprises the steps of obtaining a terminal certificate and a server certificate. The trust center service communicates the terminal metric report to the browser-center service by communicating with the browser-center service.
The CA service (authentication service) is responsible for issuing and managing digital certificates for ensuring authentication and data integrity of communications. Digital certificates are provided for trusted browser terminals, including terminal certificates and server certificates. Managing certificate issuance, revocation and renewal, and responding to security events and threats. Communicate with the browser centric service, deliver a certificate chain and certificate updates.
In one embodiment, as shown in fig. 4, the browser terminal includes:
the browser safety protection component is used for controlling plug-in components, managing certificates, integrating certificates and realizing the functions of a safety sandbox. The browser center service and the browser security protection component are jointly responsible for updating the security sandboxes and repairing loopholes.
The trusted terminal component is positioned in the browser and is responsible for trusted plugin reference value management and measurement verification functions and is communicated with a trusted center service; and trusted certificate management and metric verification functions and provide trusted metric verification functions to the secure sandboxed execution environment. The trusted terminal component obtains the trusted policy configuration from the trusted center service and applies it to the secure sandboxes and certificate management functions. The trusted terminal component is responsible for certificate management and integration, including issuing, revoked, updated, and verifying certificates. The trusted terminal component periodically obtains the latest list of trusted plugin reference values from the trusted center service and applies it to the plugin management function. The trusted terminal component is responsible for checking the plug-in reference value, provides the checking result for the browser safety protection component, and controls the plug-in to execute by the browser safety protection component. The trusted terminal component is responsible for carrying out dynamic measurement verification on the safe sandboxes and collecting and analyzing the operation data of the safe sandboxes. The trusted terminal component communicates with the trusted center service and communicates the metric verification result to the trusted center service. The trusted terminal component receives a reference value and a metric policy update for the secure sandbox from the trusted center service.
The realization of the trusted root and the safety hardware can provide the static measurement function and the dynamic measurement function of the browser application.
Based on the method and the structure, the following can be realized:
plug-in white list generation: the browser centric service is responsible for generating a whitelist of plug-ins containing a list of plug-ins allowed to run in the trusted browser terminal. The plug-in white list can be dynamically updated according to the access rights and security policies of the user.
Security policy configuration: the browser centric service defines a series of security policies for restricting and managing the behavior of the plug-ins. The security policy may include plug-in access rights, network access restrictions, data quarantine, etc., ensuring security and user privacy of the plug-in.
Plug-in authentication and authorization: the trusted terminal module is responsible for verification of the plug-in. It will check the integrity and security of the plug-in, ensuring that the plug-in has not been tampered with or contains malicious code. Only authenticated plug-ins can be authorized to operate.
Plug-in loading and running: the trusted terminal component is responsible for managing the plug-in white list, and the browser safety protection component inquires the plug-in verification result from the trusted terminal component and controls whether the plug-in is executed or not, and legal plug-ins are loaded into the browser according to the plug-in white list and the authorization result. Only plug-ins in the white list can run in the safe sandbox environment, so that the safety of the browser terminal and data is protected.
Anomaly detection and response: the trusted terminal module monitors the running state and behavior of the plug-in, and detects whether abnormal behavior or security threat exists. If an anomaly is found, it immediately notifies the browser centric service, triggering the corresponding security measures and response mechanisms.
Plug-in white list update: the browser center service periodically updates the plug-in whitelist, and ensures that new trusted plug-ins are added and untrusted plug-ins are removed in time. The updating may be based on security policies, user feedback, security threat intelligence, and the like.
Certificate issuance: the CA service is responsible for issuing digital certificates. When the trusted browser terminal establishes a connection with the CA service for the first time, the trusted terminal module sends a certificate request to the trusted center. The CA service verifies the identity and legitimacy of the terminal and generates a digital certificate containing the terminal information. The certificate is used for authentication and data encryption of subsequent communications.
Certificate verification: the trusted terminal module uses the certificate for authentication and data encryption when communicating with the server. It will verify the validity of the certificate chain provided by the server and verify the signature and digest in the certificate, ensuring the authenticity and integrity of the certificate. Only authenticated credentials can establish a secure communication connection.
Certificate updating: certificates have a validity period and need to be updated once they expire. The trusted terminal module will periodically communicate with the CA service, checking the validity and expiration time of the certificate. If the certificate is about to expire, the trusted terminal module sends a certificate update request to the CA service and acquires a new certificate. The updated certificate will be used for subsequent communications.
Certificate chain management: the trusted terminal module stores and manages a chain of certificates, including server certificates and root certificates. The certificate chain is used for establishing a trust chain and verifying the validity and the credibility of the server certificate. The trusted terminal module will check each certificate in the chain of certificates, ensure its validity, and verify the relationship of the certificate to the root certificate.
Secure communication: the trusted terminal module uses certificates for secure communications, including authentication and data encryption. It will use the server certificate to authenticate the server, ensuring that a legitimate server is connected. And meanwhile, the public key in the certificate is used for data encryption, so that the safety and the integrity of data in the communication process are protected.
Certificate revocation: if the certificate is found to be tampered with, compromised or misused, the trusted terminal module may send a certificate revocation request to the CA service. The CA service may revoke the certificate that was tampered with or no longer trusted, preventing it from continuing use.
Trusted secure browser certificate administration ensures the security of authentication and data encryption in communications. The processes of issuing, verifying, updating and revocation of the certificate ensure the authenticity, validity and credibility of the certificate. In this way, the user can establish a secure communication connection, ensuring that the communication with the server is secure and trusted.
Plug-in loading and isolation: the trusted terminal component is responsible for loading the plug-in and placing it in a secure sandboxed environment. The secure sandbox ensures that the plug-in is isolated from the browser environment and the browser terminal with the aid of the trusted terminal component. In this way, damage to the browser terminal or malicious operation of the browser environment by the plug-in can be prevented.
Resource restriction and access control: the trusted terminal component cooperates with the secure sandbox to limit and control the use of the plug-in's resources. It can set the access rights of the plug-in and limit its access to system resources (e.g. file system, operating system interface). Through resource limitation and access control, the trusted terminal component ensures that the plug-in cannot misuse rights or illegally operate the system.
Sandbox isolation mechanism: the trusted terminal component and the secure sandbox jointly implement a sandbox isolation mechanism. The secure sandbox uses techniques such as process isolation, memory isolation, and file system isolation to run the plugins in a stand-alone environment. The trusted terminal component is responsible for interacting with the secure sandbox and ensures that the plug-in is executed in the sandbox and cannot directly access the browser terminal or interact directly with the browser environment.
Dynamic measurement of safe sandboxes: the trusted terminal component is responsible for dynamically measuring the security sandboxes to ensure the security thereof. Dynamic metrics are achieved by real-time monitoring and assessment of the behavior and performance of the secure sandboxes. The trusted terminal component collects and analyzes operational data of the secure sandbox, including information on plug-in behavior, resource access, network communications, and the like. Through dynamic metrics, the trusted terminal component can detect and analyze abnormal behavior, security threats, and exploits in the secure sandboxes. It will compare predefined security policies and behavior patterns to identify potential risks and security vulnerabilities. If abnormal behavior or security threat is found, the trusted terminal component may trigger corresponding defensive measures, such as interrupting plug-in execution, preventing access to system resources, etc., to ensure the effectiveness and security of the secure sandbox.
As shown in fig. 5, the embodiment of the present application provides a computer device, including a processor 711, a communication interface 712, a memory 713, and a communication bus 714, where the processor 711, the communication interface 712, and the memory 713 perform communication with each other through the communication bus 714;
a memory 713 for storing a computer program;
the processor 711 is configured to implement the trusted running method of the browser provided by any one of the foregoing method embodiments when executing the program stored in the memory 713.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the browser trusted operating system provided herein may be implemented in the form of a computer program that is executable on a computer device as shown in fig. 5. The memory of the computer device may store various program modules that make up the trusted management center or browser terminal, such as browser-centric services, trusted center services, and CA services. The computer program comprising the program modules causes the processor to execute the method for trusted execution of the browser according to the embodiments of the present application as described in the present specification.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, the computer program implementing the browser trusted running method provided in any one of the method embodiments described above when being executed by a processor.
The system embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus a general purpose hardware platform, or may be implemented by hardware. Based on such understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the related art in the form of a software product, which may be stored in a computer readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the browser trusted operation method of the respective embodiments or some parts of the embodiments.
It is to be understood that the terminology used herein is for the purpose of describing particular example embodiments only, and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. The terms "comprises," "comprising," "includes," "including," and "having" are inclusive and therefore specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof. The method steps, processes, and operations described herein are not to be construed as necessarily requiring their performance in the particular order described or illustrated, unless an order of performance is explicitly stated. It should also be appreciated that additional or alternative may be used.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for trusted running of a browser, applied to a trusted management center, the method comprising:
when a browser running request sent by a browser terminal through a secure channel is received, identity authentication is carried out on identity information carried by the browser running request to obtain an authentication result, wherein the browser running request is used for indicating the browser terminal to request to access a preset webpage or execute a preset application program through a browser;
acquiring operation authority information corresponding to the identity information under the condition that the authentication result is that the authentication is passed;
and sending the operation permission information to the browser terminal through the secure channel, wherein the browser terminal is used for operating the trusted plugin indicated by the operation permission information in a secure sandbox under the condition of operating the browser so as to access the preset webpage or execute the preset application program.
2. The method for trusted running of a browser according to claim 1, wherein the obtaining running authority information corresponding to the identity information when the authentication result is that the authentication is passed includes:
acquiring a plug-in white list and an authentication certificate corresponding to the identity information when the authentication result is that the authentication is passed, wherein the plug-in white list comprises plug-in identifiers of a plurality of trusted plug-ins;
and taking the plug-in white list and the authentication certificate as the running authority information.
3. The method for trusted running of a browser according to claim 1, wherein after said sending the running right information to the browser terminal through the secure channel, the method further comprises:
and when an abnormal measurement result sent by the browser terminal is received, generating a safety log corresponding to the browser terminal according to the abnormal measurement result, and feeding back an abnormal elimination scheme corresponding to the abnormal measurement result to the browser terminal.
4. A method for trusted running of a browser, applied to a browser terminal, the method comprising:
when an operation instruction of a browser is received, a browser operation request is sent to a trusted management center, wherein the browser operation request is used for indicating the browser terminal to request to access a preset webpage or execute a preset application program through the browser;
and when receiving the running authority information issued by the trusted management center, running the trusted plugin indicated by the running authority information in a safe sandbox under the condition of running the browser so as to access the preset webpage or execute the preset application program.
5. The method for trusted running of a browser according to claim 4, wherein when receiving the running authority information issued from the trusted management center, running the trusted plugin indicated by the running authority information in a secure sandbox in the case of running the browser to access the preset web page or execute the preset application program, includes:
and when receiving a plug-in white list and an authentication certificate issued by the trusted management center, running a trusted plug-in corresponding to a plug-in identifier in the plug-in white list in a security sandbox under the condition of running a browser so as to access the preset webpage or execute the preset application program.
6. The method for trusted running of a browser according to claim 5, wherein when receiving a plug-in whitelist and an authentication certificate issued by the trusted management center, running a trusted plug-in corresponding to a plug-in identifier in the plug-in whitelist in a secure sandbox in the case of running the browser, so as to access the preset web page or execute the preset application program, the method further comprises:
encrypting the identity information of the browser terminal and a data request by using the authentication certificate to obtain encrypted identity information and an encrypted data request, wherein the data request is used for requesting to acquire target data;
sending the encrypted identity information and the encrypted data request to a resource server;
under the condition that the resource server passes the authentication of the encrypted identity information and successfully decrypts the encrypted data request, obtaining encrypted target data after the resource server encrypts the target data according to the authentication certificate;
and decrypting the encrypted target data according to the authentication certificate to obtain the target data.
7. The method for trusted running of a browser according to claim 5, wherein when receiving a plug-in whitelist and an authentication certificate issued by the trusted management center, running a trusted plug-in corresponding to a plug-in identifier in the plug-in whitelist in a secure sandbox in the case of running the browser, so as to access the preset web page or execute the preset application program, the method further comprises:
in the process of running the trusted plugins in the plugin white list in the security sandbox, carrying out security measurement on the browser terminal to obtain a trusted measurement result; when the trusted measurement result is an abnormal measurement result, sending the abnormal measurement result to the trusted management center;
and executing an anomaly elimination scheme fed back by the trusted management center for the anomaly measurement result when the anomaly elimination scheme is received.
8. A browser trusted running system, characterized in that the system comprises a trusted management center for implementing the browser trusted running method according to any one of claims 1-3 and a browser terminal for implementing the browser trusted running method according to any one of claims 4-7.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of trusted browser operation of any of claims 1-3, or 4-7 when the computer program is executed.
10. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the method of trusted browser operation of any of claims 1-3, or 4-7.
CN202311800902.9A 2023-12-25 2023-12-25 Browser trusted running method, system, computer equipment and storage medium Pending CN117874741A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311800902.9A CN117874741A (en) 2023-12-25 2023-12-25 Browser trusted running method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311800902.9A CN117874741A (en) 2023-12-25 2023-12-25 Browser trusted running method, system, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117874741A true CN117874741A (en) 2024-04-12

Family

ID=90589509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311800902.9A Pending CN117874741A (en) 2023-12-25 2023-12-25 Browser trusted running method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117874741A (en)

Similar Documents

Publication Publication Date Title
EP3453136B1 (en) Methods and apparatus for device authentication and secure data exchange between a server application and a device
Chou Security threats on cloud computing vulnerabilities
US20160197962A1 (en) Network Access Control with Compliance Policy Check
CN108418691B (en) Dynamic network identity authentication method based on SGX
US7752320B2 (en) Method and apparatus for content based authentication for network access
Peotta et al. A formal classification of internet banking attacks and vulnerabilities
CN109361668A (en) A kind of data trusted transmission method
US20210014245A1 (en) In-stream malware protection
US20130111211A1 (en) External Reference Monitor
US10333930B2 (en) System and method for transparent multi-factor authentication and security posture checking
US9288199B1 (en) Network access control with compliance policy check
Xu et al. Data-provenance verification for secure hosts
Atashzar et al. A survey on web application vulnerabilities and countermeasures
Krawiecka et al. Safekeeper: Protecting web passwords using trusted execution environments
CN103117998A (en) Safety reinforcing method based on JavaEE application system
Motero et al. On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
Budianto et al. You can’t be me: Enabling trusted paths and user sub-origins in web browsers
Sung et al. Security analysis of mobile authentication using qr-codes
CN117874741A (en) Browser trusted running method, system, computer equipment and storage medium
Alanazi et al. The history of web application security risks
CN111669746A (en) Protection system for information security of Internet of things
Dhondge Lifecycle IoT Security for Engineers
Süß et al. Cloud security and security challenges revisited
Baghdasaryan et al. FIDO Security Reference
Parmar et al. Achieving Trust using RoT in IaaS Cloud

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination